Burn Protector can be installed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software powerful engine can protect any number of computers and monitor the protected computers for active burning permissions. The software provides easy-to-use network administration interface including auto discovery, auto scanning, reports, actions, exporting capabilities and database support. The software also collects burning events and configuration changes that help network administrators to track and maintain the protected computers.

TR-069 ManagerTR-069 Manager is real-time windows based software for CWMP management that provides ACS capabilities to manage remote CPE sites and helps to get and set parameters, view statistics and perform actions on any TR-069 supported devices. The software CWMP man

Syslog CenterSyslog Center is real-time monitor server daemon software for windows platforms that supports any vendor and helps to monitor, analyze, report and correlate real-time network events.Syslog Center can be operated as standard windows application or as window

Security Center ProSecurity Center Pro is a real-time network security software for intrusion detection IDS and prevention IPS that helps to prevent malicious network activities and potential network intruders. Security Center can be connected in any network either it is swi

Switch Center ProtectorSwitch Protector is add-on engine of Switch Center software that provides Network Access Control (NAC) features on any managed network switches and hubs from any vendor supporting SNMP BRIDGE-MIB and helps to protect networks from potential intruders, unau

Wireless Protector WorkgroupWireless Protector Workgroup automatically disable wireless and endpoint devices on computers that connected to the company network by LAN cable and re-enable the devices when the LAN cable is disconnected from the protected computers. The Enterprise versi

Net Monitor for EmployeesNet Monitor for Employees is a program that allows a 'view' of a monitor of a remote computer, which is connected to the network. This way you can observe what your employees are doing. What is it useful for? For monitoring your employees activities on

USB Lock RPA twelve year old evolution straightforward solution that includes functionality required and suggested by real IT Infrastructure Professionals, IT Managers and Network Systems Security Analysts of top-notch organizations. You will find serious capacity to

Licence ProtectorYou have developed an application and you want to protect it fast, easy, reliable and cost effective?
Licence Protector from Mirage Computer Systems administrates licenses and modules (license manager and control), generates Demo- and time limited versi

Notes Password RecoveryThe Notes Password Recovery utility allows you to recover a forgotten password from a Lotus Notes ID file. You have a choice of using either: Dictionary Search Method - which attempts words contained in a dictionary file (also called a word list) Brute For

Chris Nowell Unix Security AnalyzerThis tool tests Solaris, AIX, HP-UX, and Linux against best practices. Some tests include explanations and background information. The Windows Configuration Security Analyzer comes with a shell script that system administrators can run on their servers to

Avast Endpoint ProtectionSecure your endpoint PCs with avast! Endpoint Protection, designed to be an intuitive, worry-free, and efficient solution for SOHO networks of up to 199 computers and no server. Your business gets secure web browsing, the ability to centrally manage your e

NetResidentNetResident is an advanced network content monitoring program that captures, stores, analyzes, and reconstructs network events such as e-mail messages, Web pages, downloaded files, instant messages, and VoIP conversations. While NetResident is similar to n

Lencom Content GuardSimplifies discovery of content theft, plagiarism, and content duplication. Any of your original content, on your desktop computer or on your Web site, LCG protects content carefully analyzing uniqueness of the text, searching and comparing it using differ